🔐 CVE Alert

CVE-2025-34215

UNKNOWN 0.0

Vasion Print (formerly PrinterLogic) Unauthenticated Firmware Update Endpoint RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (only VA deployments) expose an unauthenticated firmware-upload flow: a public page returns a signed token usable at va-api/v1/update, and every Docker image contains the appliance’s private GPG key and hard-coded passphrase. An attacker who extracts the key and obtains a token can decrypt, modify, re-sign, upload, and trigger malicious firmware, gaining remote code execution. This vulnerability has been identified by the vendor as: V-2024-020 — Remote Code Execution.

CWE CWE-306 CWE-321
Vendor vasion
Product print virtual appliance host
Published Sep 29, 2025
Last Updated May 15, 2026
Stay Ahead of the Next One

Get instant alerts for vasion print virtual appliance host

Be the first to know when new unknown vulnerabilities affecting vasion print virtual appliance host are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Vasion / Print Virtual Appliance Host
0 < 22.0.1026
Vasion / Print Application
0 < 20.0.2702

References

NVD ↗ CVE.org ↗ EPSS Data ↗
pierrekim.github.io: https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-rce-02 help.printerlogic.com: https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm help.printerlogic.com: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm vulncheck.com: https://www.vulncheck.com/advisories/vasion-print-printerlogic-unauth-firmware-update-endpoint-rce

Credits

Pierre Barre